Early Warning Services, LLC

Early Warning Services, LLC Patent applications

Patent application number

Title

Published

20160132851

LOCATION-BASED AUTHENTICATION OF TRANSACTIONS CONDUCTED USING MOBILE DEVICES - A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.

SYSTEM AND METHOD FOR LOCATING AND ACCESSING ACCOUNT DATA TO VERIFY INCOME - Account data (e.g., account balance, account identifiers, account holder information and transaction data) for accounts at a plurality of financial institutions are stored at one or more databases within an account database system. The account data may be accessed in response to various requests (asset search request, as a verification request and income verification request). Transaction data for an account (such as ACH transaction messages) may be used to identify or verify income to an account holder, based on deposit/credits to the account.

03-24-2016

20160078529

SYSTEM AND METHOD FOR MAPPING AND MONITORING DEPOSIT CHANNELS - In order to prevent false positives at a duplicate transaction detection system, channel deposit data from financial institutions (representing the manner of presentment of checks at those institutions) are provided to a channel mapping/monitoring system. The channel mapping monitoring system calculates a prediction interval representing a normal expected range of deposits in any given channel. If deposits at a financial institution fall outside the normal expected range, the channel mapping/monitoring system provides an alert to the financial institution.

03-17-2016

20140337087

IDENTIFICATION AND RISK EVALUATION - Methods, systems, and machine-readable media are disclosed for identification of an individual and evaluation of risk from doing business with that individual. In one embodiment a method of evaluating a risk from conducting business with an individual comprises receiving identity information related to the individual. The identity information includes information from an identity credential presented by the individual. The identity credential is validated based on the information from the identity credential and one or more positive databases. An identity of the individual is verified based on the identity information and the one or more positive databases. The identity information is screened against one or more negative databases indicating past losses to one or more entities. Results of the screening are reported based on one or more criteria of an entity considering doing business with the individual.

11-13-2014

20140222631

SYSTEM AND METHOD FOR SUSPECT ENTITY DETECTION AND MITIGATION - A plurality of institutions (such as financial institutions) contribute data to a data analysis and linking system. The system analyzes the data to create data nodes (records) associated with an entity, where the entity may be, for example, a person/individual, business, organization, account, address, telephone number, etc. After data is linked, and in order to retrieve linked data, a requester may provide to the system an identifier associated with an entity. The linked data provided by the system in response to the identifier may be in the form of a network of data nodes associated with the entity and for use in assessing risk, such as risk associated with a transaction being conducted by a person. The linked data may also be analyzed at the system to score risk associated with the entity, and the risk score provided in conjunction with or in lieu of the network of data nodes.

08-07-2014

20140108257

MANAGEMENT OF BIOMETRIC INFORMATION - Fraud risk is monitored in financial transactions. Biometric information is received over the communications interface configured to exchange data with multiple distinct financial institutions. The received biometric information is compared with a database of biometric information to identify an individual. A fraud-detection analysis is performed on the financial transaction information associated with the individual. The financial transaction information associated with the individual is identified as suspicious in accordance with a result of the fraud-detection analysis. The biometric parameters associated with the individual are designated as associated with suspicious financial activity.

04-17-2014

20140032385

DATABASE FOR CHECK RISK DECISIONS POPULATED WITH CHECK ACTIVITY DATA FROM BANKS OF FIRST DEPOSIT - A plurality of banks of first deposit provide checking account activity data for both transit items (checks received for deposit that need to be cleared) and incoming returns (bounced checks) to a statistical model which determines from the data the likelihood that a check from a specific checking account will be returned. This data is used to populate a database of checking accounts to be used for making check risk decisions, such as check hold policy decisions, check acceptance decisions, and open to buy decisions.

01-30-2014

20130191273

SYSTEM AND METHOD FOR EXPEDITED RELEASE OF HELD ITEMS - A system for identifying and expediting the release of held items, such as checks. Paying banks (having accounts against which the checks are drawn) provide paid item files to the system, and depository banks (where checks have been deposited) provide held item files to the system. If there is a match of a paid item file and held item file (indicating that a held check has been paid by the paying bank), the depository bank is notified that the item has been paid and that the hold may be released.

07-25-2013

20130132248

IDENTIFICATION AND RISK EVALUATION - Methods, systems, and machine-readable media are disclosed for identification of an individual and evaluation of risk from doing business with that individual. In one embodiment a method of evaluating a risk from conducting business with an individual comprises receiving identity information related to the individual. The identity information includes information from an identity credential presented by the individual. The identity credential is validated based on the information from the identity credential and one or more positive databases. An identity of the individual is verified based on the identity information and the one or more positive databases. The identity information is screened against one or more negative databases indicating past losses to one or more entities. Results of the screening are reported based on one or more criteria of an entity considering doing business with the individual.

SYSTEM AND METHOD FOR LOCATING AND ACCESSING ACCOUNT DATA - Account data (e.g., balance information) for accounts at a plurality of financial institutions (or government agencies) is stored (and updated) in a central database system and accessed using a personal identifier, such as a social security number. Risk data may be generated for accounts based on the account data. The account data and risk data are accessed in response to either an account search request (e.g., from a government entity and relating to a benefits program or a subpoena) or an account verification request (e.g. from a mortgage company and relating to a mortgage application).

12-27-2012

20120330689

SYSTEM AND METHODS FOR FRAUD DETECTION/PREVENTION FOR A BENEFITS PROGRAM - Systems and methods of the present invention detect and/or deter individuals who may be collecting or intending to collect unemployment insurance (UI) benefits and simultaneously receive pay from an employer. Embodiments identify, during either initial screening of a UI applicant or on an ongoing basis for current recipients, those individuals who would seek to defraud UI programs by receiving improper payments. Methods include locating account information in databases from one or more (preferably, a plurality) of financial service organizations pertaining to deposit (or other) accounts for an individual applying for benefits, analyzing deposit transactions into those accounts, determining whether the individual is likely to be receiving deposits from employment or wages, and providing information to an entity such as a government agency regarding likely employment deposits for the individual.

12-27-2012

20120239557

SYSTEM AND METHOD FOR DETECTING FRAUDULENT ACCOUNT ACCESS AND TRANSFERS - Transfers of money into a recipient account are analyzed for risk of fraud by using a fraud monitoring system to analyze characteristics of the recipient account. The recipient account characteristics are stored in a central database, which has account data (for recipient accounts) contributed from a plurality of financial institutions that maintain such accounts. When a transfer is made or attempted, the stored characteristics of the recipient account are analyzed and a risk score is assigned to the transfer based on the recipient account. If the risk score indicates a suspicious or fraudulent transaction, an alert is provided. In an alternative embodiment, the risk analysis may be supplemented by analysis of transaction data association with the transfer.

09-20-2012

20120226590

SYSTEM AND METHOD FOR SUSPECT ENTITY DETECTION AND MITIGATION - A plurality of institutions (such as financial institutions) contribute data to a data analysis and linking system. The system analyzes the data to create data nodes (records) associated with an entity, where the entity may be, for example, a person/individual, business, organization, account, address, telephone number, etc. After data is linked, and in order to retrieve linked data, a requester may provide to the system an identifier associated with an entity. The linked data provided by the system in response to the identifier may be in the form of a network of data nodes associated with the entity and for use in assessing risk, such as risk associated with a transaction being conducted by a person. The linked data may also be analyzed at the system to score risk associated with the entity, and the risk score provided in conjunction with or in lieu of the network of data nodes.

09-06-2012

20120101945

IDENTITY VERIFICATION SWITCH - Methods, systems, and machine-readable media are disclosed for an identity verification switch. According to one embodiment, the method comprises receiving from an inquirer a request to verify an identity of an individual initiating a transaction. The request includes account information for an account subject to the transaction and identity information for the individual initiating the transaction. Based on the request, a verifying financial institution is selected from one or more participating financial institutions. The request is forwarded to the verifying financial institution for verification of the identity information. An answer is received from the verifying financial institution indicating results of verification of the identity information. The answer is returned to the inquirer.

04-26-2012

20110231312

PAYMENT ACCOUNT MONITORING SYSTEM AND METHOD - A network includes an account status system for checking the status of checking accounts used to make payments, and a payment account monitoring system that includes linking files that store, for individual credit card accounts, the account numbers for checking accounts used to pay the credit card accounts. The monitoring system periodically retrieves checking account numbers from the linking files and checks the account numbers at the status system. If a negative status is indicated at the status system, an alert is provided to the credit card company.

09-22-2011

20090313069

Identity Verification Systems and Methods - Systems and methods are disclosed for verifying customer identifications. In one embodiment, the method comprises receiving, at a transaction gateway, a communication associated with a transaction initiated by a customer; determining the communication includes an identity verification request to verify encoded data obtained from an identification presented by the customer; routing the identity verification request to an identity verification service; receiving, from the identity verification service, a result including one or more identification values obtained from the encoded data; and transmitting the result to a requester associated with the communication.

12-17-2009

20090132393

SYSTEM AND METHOD FOR EXPEDITED RELEASE OF HELD ITEMS - A system for identifying and expediting the release of held items, such as checks. Paying banks (having accounts against which the checks are drawn) provide paid item files to the system, and depository banks (where checks have been deposited) provide held item files to the system. If there is a match of a paid item file and held item file (indicating that a held check has been paid by the paying bank), the depository bank is notified that the item has been paid and that the hold may be released.

05-21-2009

20090012889

PAYMENT ACCOUNT MONITORING SYSTEM AND METHOD - A network includes an account status system for checking the status of checking accounts used to make payments, and a payment account monitoring system that includes linking files that store, for individual credit card accounts, the account numbers for checking accounts used to pay the credit card accounts. The monitoring system periodically retrieves checking account numbers from the linking files and checks the account numbers at the status system. If a negative status is indicated at the status system, an alert is provided to the credit card company.

01-08-2009

20080294541

DATABASE FOR CHECK RISK DECISIONS POPULATED WITH CHECK ACTIVITY DATA FROM BANKS OF FIRST DEPOSIT - A plurality of banks of first deposit provide checking account activity data for both transit items (checks received for deposit that need to be cleared) and incoming returns (bounced checks) to a statistical model which determines from the data the likelihood that a check from a specific checking account will be returned. This data is used to populate a database of checking accounts to be used for making check risk decisions, such as check hold policy decisions, check acceptance decisions, and open to buy decisions.